Skip main navigation

Measuring encryption

In the previous couple of steps, you used a basic substitution cipher and saw how simplicity makes such schemes trivial to crack. You are now going to explore how encryption …

The history of encryption

In this step, you will learn about the evolution of this type of encryption, from 60 BCE to the Second World War. Encryption techniques and other tools for sending secret …

Perfect encryption

In this step you will learn about the strongest encryption scheme, the one-time pad (or OTP, as implemented by the Vernam cipher), and its limitations. Computationally secure Last week we …

Encryption and network security

A key application of encryption is network security. In this step you will learn several of the roles that encryption plays in a secure network. Networks that handle data are …

Symmetric and asymmetric encryption

Modern encryption techniques can broadly be sorted into two categories: symmetric encryption and asymmetric encryption. In this step, you will learn about these two types of encryption and how they …

Vigenère cipher

In this step we will look at the Vigenère cipher. As you learned a few steps ago, the Vigenère cipher is a polyalphabetic cipher from the 16th century. It uses …

The encryption process

In this step you will learn about several of the main concepts in the encryption process, as well as some important terms. As you have already seen, an encryption scheme …

What is encryption?

In this step you will learn what encryption is and how it can be used. The definition of encryption Encryption is a process that transforms data into something that appears …